Affiliation:
1. Department of Energy and Information (DEI), University of Bologna, Bologna, Italy
2. Department of Energy and Information (DEI), Università di Bologna, Bologna, Italy
3. Technology Innovation Institute, Abu Dhabi, United Arab Emirates
4. Technology Innovation Institute, Abu Dhabi United Arab Emirates
5. Department of Energy and Information (DEI), UNIBO, Bologna, Italy
Abstract
The rapid advancement and exploration of open-hardware RISC-V platforms are catalyzing substantial changes across critical sectors, including autonomous vehicles, smart-city infrastructure, and medical devices. Within this technological evolution, OpenTitan emerges as a groundbreaking open-source RISC-V design, renowned for its comprehensive security toolkit and role as a standalone system-on-chip (SoC). OpenTitan encompasses different SoC implementations such as Earl Grey, fully implemented and silicon proven, and Darjeeling, announced but not yet fully implemented. The former targets a stand-alone system-on-chip implementation, the latter oriented towards an integrable implementation. Therefore, the literature currently lacks of a silicon-ready embedded implementation of an open-source Root of Trust, despite the effort put by lowRISC on the Darjeeling implementation of OpenTitan. We address the limitations of existing implementations, focusing on optimizing data transfer latency between memory and cryptographic accelerators to prevent under-utilization and ensure efficient task acceleration. Our contributions include a comprehensive methodology for integrating custom extensions and IPs into the Earl Grey architecture, architectural enhancements for system-level integration, support for varied boot modes, and improved data movement across the platform. These advancements facilitate the deployment of OpenTitan in broader SoCs, even in scenarios lacking specific technology-dependent IPs, providing a deployment-ready research vehicle for the community. We integrated the extended Earl Grey architecture into a reference architecture in 22nm FDX technology node, and then we benchmarked the enhanced architecture’s performance analyzing the latency introduced by the external memory hierarchic levels, presenting significant improvements in cryptographic processing speed, achieving up to 2.7
x
speedup for SHA-256/HMAC and 1.6
x
for AES accelerators, compared to baseline Earl Grey architecture.
Publisher
Association for Computing Machinery (ACM)
Reference44 articles.
1. Esmerald Aliaj, Ivan De Oliveira Nunes, and Gene Tsudik. 2022. GAROTA: Generalized Active Root-Of-Trust Architecture (for Tiny Embedded Devices). In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 2243–2260. https://www.usenix.org/conference/usenixsecurity22/presentation/aliaj
2. Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks
3. Thomas Benz Michael Rogenmoser Paul Scheffler Samuel Riedel Alessandro Ottaviano Andreas Kurth Torsten Hoefler and Luca Benini. 2023. A High-performance Energy-efficient Modular DMA Engine Architecture. arxiv:2305.05240 [cs.AR]
4. Cyber Security aboard Micro Aerial Vehicles: An OpenTitan-based Visual Communication Use Case
5. An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics